Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)

被引:0
|
作者
Annadurai, P. [1 ]
Vijayalaksmi, S. [2 ]
机构
[1] Arignar Anna Govt Arts & Sci Coll, Dept Comp Sci, Karaikal, Puducherry Stat, India
[2] Hindustan Univ, Dept Comp Applicat, Madras, Tamil Nadu, India
关键词
clustering; trust; authentication; services; malicious node; MANET;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc network is an autonomous collection of mobile nodes communicating over wireless links where the node scan communicate with each other in temporary manner with no centralized administration and in a dynamic topology that changes frequently. A malicious node can constantly report incorrect information to other nodes in the network, which can lead to whole network down. The proposed work identifying malicious node using trust value in cluster based MANET is used to detect the malicious node in cluster. The cluster formation process is realized by grouping nearby nodes to form a cluster. To every cluster, cluster head is assigned based on the energy of the nodes. The trust value calculation is used to find the behavior of the node. It is calculated by Cluster Member (CM), direct and indirect trust value. The trust value of the cluster member is maintained in the counter table. During the data transmission time, the Cluster Head (CH) monitors its cluster member behavior. When any misbehavior is monitored by cluster head means, it sends the request about that misbehaving node to its nearby node (NN) to get the direct trust value (DTV).And also CH sends the request to other cluster members about that misbehaving node. If that cluster members are having value about that misbehaving node means, it sends the indirect trust value to the CH. Otherwise cluster members ignores the request send by CH. The goal of the proposed work is identify the malicious nodes in the cluster using the trust values in effective manner. Simulation result in NS-2 accurately predicts the performance of proposed scheme in terms of cluster energy level analysis, routing performance, system performance under varying network conditions.
引用
收藏
页码:1150 / 1158
页数:9
相关论文
共 50 条
  • [31] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    Gandhimathi, L.
    Murugaboopathi, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1209 - 1222
  • [32] A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism
    Dhand, Geetika
    Rao, Meena
    Chaudhary, Parul
    Sheoran, Kavita
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235
  • [33] Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN
    Das R.
    Dwivedi M.
    Journal of Reliable Intelligent Environments, 2024, 10 (01) : 55 - 71
  • [34] Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
    Opinder Singh
    Jatinder Singh
    Ravinder Singh
    Cluster Computing, 2018, 21 : 51 - 63
  • [35] Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
    Shankar, K.
    Elhoseny, Mohamed
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (10) : 1221 - 1239
  • [36] Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
    Singh, Opinder
    Singh, Jatinder
    Singh, Ravinder
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 51 - 63
  • [37] A Loom for Revealing Selfish and Malicious Node in Cluster Based Adhoc Wireless Networks
    Sonekar, Shrikant V.
    Kshirsagar, Manali
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 370 - 375
  • [38] Routing in MANET Using Cluster Based Approach (RIMCA)
    Mahmood, Dhari Ali
    Johari, Rahul
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 30 - 36
  • [39] An algorithm for determining data forwarding strategy based on recommended trust value in MANET
    Xu, Jianbo
    Feng, Shu
    Liang, Wei
    Ke, Jian
    Meng, Xiangwei
    Zhang, Ruili
    Shou, Danping
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 544 - 553
  • [40] Malicious vehicle node detection mechanism based on repeated game and trust evaluation in VANET
    Zhu, Yatao
    Wang, Yongli
    2020 3RD INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY (CISAT) 2020, 2020, 1634